In this post we will be presenting a pre-authenticated remote code execution vulnerability present in Tenda’s AC15 router. We start by analysing the vulnerability, before moving on to our regular pattern of exploit development – identifying problems and then fixing those in turn to develop a working exploit.

In any case, you read with exasperation or amusement the multiple errors in a story-and then turn the page to national or international affairs, and read with renewed interest as if the rest of the newspaper was somehow more accurate about far-off Palestine than it was about the story you just read. You turn the page, and forget what you know.

Some environments use whitelisting to prevent unsigned Windows Scripting Host (WSH) files from running, especially with the rise of malicious .js or .vbs files. However, by “injecting” our malicious code into a Microsoft signed WSH script, we can bypass such a restriction.

Two changes explain all the discrepancies, they say. First, there’s been an increase in monopoly power, likely caused by an increase of power in the hands of dominant companies. Second, productivity growth has slowed and the population has aged, driving down the natural rate of interest.

Kialo is designed to facilitate constructive debate about the most important issues in the world, without turning into the usual Internet Shouting Factory. We aspire to become not just where you come to argue, but also where you can explore the reasons why people disagree and see diverse points of view on the issues that matter.

Streisand sets up a new server running L2TP/IPsec, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, a Tor bridge, and WireGuard. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.

Charlie Green of Olivella’s envisioned the concept when he traveled Southern California in search of the perfect Mexican street food. In his travels, Green visited the state’s barely-surviving midcentury diners, and wanted to revive that aesthetic in DFW.

"The tech companies have to be ... careful that they're not trying to think their view is more important than the government's view, or than the government being able to function in some key areas," Gates said in an interview with Axios.

IT's SAD THAT EVEN THE RICHEST MAN IN THE WORLD HAS TO KOWTOW, HONESTLY.

Recently I posted how to get ssh password using strace, but it’s no 100% effective, because the strace output changes on different distros, so searching for another approach I found this site ChokePoint where they show how to create a PAM module using python to log failed attempts on ssh, now all I have to do, was change where they log the password.

College football games averaged nearly three and a half hours in 2016, and some went for nearly five hours. One game lasted so long, Mack Brown had to leave the announcer's booth on air. That’s absurd, and people have plenty of ideas on how to rectify that.

Some of those ideas are ridiculous. We’re not going to change quarter length from 15 minutes to 12. It seems unfair to reduce the number of replays in a game; if your officiating crew is having a bad night, saying "just accept it" doesn’t work.

But, even with that, I’d be hard pressed to say that completing great online CS classes isn’t going to help you become a better interviewee, especially if you didn’t have the benefit of a rigorous algorithms class up until then. Indeed, a lot of the courses we saw people take focused around algorithms, so it’s no surprise that supplementing your preparation with courses like this could be tremendously useful. Some of the most popular courses we saw were:

We give students four reasons for learning C:
It is still one of the most commonly used languages outside of the Bay Area web/mobile startup echo chamber;
C’s influence can be seen in many modern languages;
C helps you think like a computer; and,
Most tools for writing software are written in C (or C++)

The most frequently assigned book on science in universities (aside from a popular biology textbook) is Thomas Kuhn’s The Structure of Scientific Revolutions. That 1962 classic is commonly interpreted as showing that science does not converge on the truth but merely busies itself with solving puzzles before lurching to some new paradigm that renders its previous theories obsolete; indeed, unintelligible. Though Kuhn himself disavowed that nihilist interpretation, it has become the conventional wisdom among many intellectuals. A critic from a major magazine once explained to me that the art world no longer considers whether works of art are "beautiful" for the same reason that scientists no longer consider whether theories are "true."

Americans increasingly value romance over the institution of marriage, just as they shun religious institutions for the ethereal appeal of spirituality. But even as we fall out of love with institutions, we continue to have the needs they once satisfied, displacing those needs onto relationships that collapse under a weight only God and faith can lift.

In each case, the researchers simply asked the participants to sit in a dim, quiet room, without their mobile phones or similar distractions. “We don’t give them any specific instructions with regards to what they should or shouldn’t do while resting,” Dewar says. “But questionnaires completed at the end of our experiments suggest that most people simply let their minds wander.”

They say one person’s trash is another person’s treasure, and that could quite literally be the case for toxic coal mine waste. A group of researchers at West Virginia University is currently building a prototype treatment facility that will clean up runoff from old coal mines while simultaneously skimming out rare earth metals—the difficult-to-separate elements needed to make high tech products, including smartphones.

The senior military advisor to Iran's supreme leader Ayatollah Ali Khamenei claimed in a press conference in Tehran today that Western nations had deployed reptiles as nuclear spies. Agence France-Presse reports that Hassan Firuzabadi, previously chief of staff of Iran's military, justified the recent arrest of environmentalists by claiming that the West had used scientists and environmental activists to spy on Iran's nuclear program by deploying lizards that could "attract atomic waves."

The other set of numbers in the model—the utilization rate of the self-driving trucks—is the component that leads Uber to a different analysis of the effect that these vehicles will have on truckers. Basically, if the self-driving trucks are used far more efficiently, it would drive down the cost of freight, which would stimulate demand, leading to more business. And, if more freight is out on the roads, and humans are required to run it around local areas, then there will be a greater, not lesser, need for truck drivers.

The Russian assault may have been a rogue operation, underscoring the complexity of a conflict that started as a domestic crackdown only to morph into a proxy war involving Islamic extremists, stateless Kurds and regional powers Iran, Turkey and now Israel. Russia’s military said it had nothing to do with the attack and the U.S. accepted the claim. Defense Secretary Jim Mattis called the whole thing “perplexing,” but provided no further details.

For those who don't know the backstory (many here will) -- crypto is hard to implement correctly; protocols are hard to implement correctly; and C isn't the easiest language to use. [Disclaimer: I've used C "since forever", love it, and am pretty decent with it, but I've made my goofs. I've also implemented crypto & protocols myself, neither probably very well...]
Apparently in ~1995, Eric A. Young ("EAY") decided to implement his own SSL stack (called "SSLeay"), at least partially with the goal of learning the C programming language.
At some point, SSLeay became OpenSSL, EAY moved off the project, and OpenSSL went on to become a staple of network computer security (and insecurity).
I can't find a reference to back this up right now, but I know I've seen it in the past somewhere credible enough that I'm here repeating the folklore.

Paskto will passively scan the web using the Common Crawl internet index either by downloading the indexes on request or parsing data from your local system. URLs are then processed through Nikto and known URL lists to identify interesting content.

Replicator helps developers to reproduce issues discovered by pen testers. The pen tester produces a Replicator file which contains the findings in the report. Each finding includes a request, associated session rules or macros, and logic to detect presence of the vulnerability. The tester sends the Replicator file to the client alongside the report. Developers can then open the file within Burp and replicate the issues. When vulnerabilities have been fixed, Replicator provides confirmation that the attack vector used in the pen test is now blocked. A retest is still recommended, in case alternative attack vectors remain exploitable.

Respounder sends LLMNR name resolution requests for made-up hostnames that do not exist. In a normal non-adversarial network we do not expect such names to resolve. However, a responder, if present in the network, will resolve such queries and therefore will be forced to reveal itself.

As far as I know, tcpTrigger is currently the only solution capable of detecting NetBIOS and LLMNR name poisoning. The way it works is very simple: every few minutes it broadcasts NetBIOS and LLMNR name queries for fictitious names, and if a response is returned, an alert is triggered.

This opens up the scenario that a fund may exhaust all its investor’s capital and have to liquidate its positions in a possibly illiquid and unfriendly environment. Today we present two such funds that at first glance do not look like they fall into a liquidity trap: XIV and SVXY. Rest assured, however, these two funds will suddenly and violently go to zero.

Most digital currencies are unlikely to survive in their current form, and investors should prepare for coins to lose all their value as they’re replaced by a small set of future competitors, Goldman’s Steve Strongin said in a report dated Feb. 5. While he didn’t posit a timeframe for losses in existing coins, he said recent price swings indicated a bubble and that the tendency for different tokens to move in lockstep wasn’t rational for a “few-winners-take-most” market.

Follow-up research found that the default mode is also used during the process of self-reflection. In 2013, in Frontiers in Human Neuroscience, Joseph Moran et al. wrote, the brain’s default mode network “is observed most closely during the psychological task of reflecting on one’s personalities and characteristics (self-reflection), rather than during self-recognition, thinking of the self-concept, or thinking about self-esteem, for example.”
When the brain rests it is able to integrate internal and external information into “a conscious workspace,” said Moran and colleagues.

Almost every developer in the world has heard of the blockchain but most still don’t know how it works. They might only know about it because of Bitcoin and because they’ve heard of things like smart contracts. This post is an attempt to demystify the blockchain by helping you write your own simple blockchain in Go, with less than 200 lines of code!

Well, my guest today says that perhaps the way you start to get out of that rut is to clean your room, bucko. His name is Jordan B. Peterson, and I’ve had him on the show before. Peterson is a psychoanalyst and lecturer, and he’s got a new book out called 12 Rules for Life: An Antidote to Chaos. Today on the show, Dr. Peterson and I discuss why men have been disengaging from work and family and why his YouTube lectures resonate with so many modern men.

If you've heard of containers and this thing called Kubernetes, but you're not sure exactly how they work and what they are, this episode is for you. Kelsey Hightower of Google gives us a newbie friendly tour of the world of containers. We talk about what problems they solve, and what new developers should know about them.

Each team member now has a single Yubikey USB security device that does all of the following:
Stores and loads our personal SSH keys
Provides one-touch two-factor authentication
Stores and recalls our 1Password secret keys

On Jan. 2, the managers put down $200,000 on what looked like a lottery ticket, with each SVXY put costing 34 cents. On Feb. 6, they sold the 6,300 contracts at about $28 each, leaving them with $17.5 million.

All that's needed to reproduce the bug, Borup wrote, is to compile his proof-of-concept code and give it a static link as MSIMG32.dll; copy that file to C:\windows\temp; and run sc control lnsusvc 136 at the command line.

Some time ago, I found a design flaw/vulnerability which affects most TCP services and allows for a new variant of denial of service. This attack can multiply the efficiency of a traditional DoS by a large amount, depending on what the target and purpose may be.

The idea behind this attack is to close a TCP session on the attacker's side, while leaving it open for the victim. Looping this will quickly fill up the victim’s session limit, effectively denying other users to access the service.

Direct Instruction was pioneered by Siegfried Engelmann in the 1960s and is a scientific approach to teaching. First, a skill such as reading or subtraction is broken down into simple components, then a method to teach that component is developed and tested in lab and field. The method must be explicitly codified and when used must be free of vagueness so students are reliably led to the correct interpretation. Materials, methods and scripts are then produced for teachers to follow very closely. Students are ability not age-grouped and no student advances before mastery. The lessons are fast-paced and feedback and assessment are quick. You can get an idea of how it works in the classroom in this Thales Academy promotional video. Here is a math lesson on counting. It looks odd but it works.

There's been a lot of talk over the past couple of years about rising crime. For good reason: Violent crime and murder were in fact up in the U.S. in 2015 and 2016. Early indications are that crime rates fell in 2017, though. 1 And the really big crime story of our time remains how much it has fallen in this country over the past quarter-century.

"Berkeley is the center of the resistance, and for the resistance to work, it must have a coin," says a city council member, in a sentence that makes as little sense as every other sentence in this story. You can just sell the municipal bonds. Why sell "tokens" that are backed by municipal bonds? Fine, fine, you want to issue the bonds "on the blockchain"? I will allow it, you gotta keep track of the bonds somehow, that is some harmless buzzwordery. But throwing in the buzzword "token" is, I think, a bridge too far.

As someone who wants strong counter-majoritarian protections for all sorts of minority rights, this troubles me. But even if it doesn’t bother you to declare that millions of voters need to be kept out of the political process, you should be troubled by the evidence that it hasn’t worked. The conspiracy has been out-conspired; the experiment has blown up. It’s time to abandon the magic formula before the damage gets worse.

The worry is that investors will stampede out of loan ETFs, which account for about $10 billion of the $156 billion in loan fund investments, faster than the ETF managers can sell the underlying loans in their portfolio. This would cause a gap in the value of the ETF and the value of the loans in it, or worse, the possibility the funds may not be able to immediately come up with money for investors looking to cash out. Fear of not being able to get your money back is what causes bank runs and financial mayhem in general.